Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Chapter 8:

Subnetting IP Networks
Anthony Maina

Course Website:

https://sites.google.com/a/dkut.ac.ke/networks/
Chapter 8 - Sections & Objectives
 8.1 Subnetting an IPv4 Network
• Implement an IPv4 addressing scheme to enable end-to-end connectivity in a small to
medium-sized business network.
• Explain how subnetting segments a network to enable better communication.
• Explain how to calculate IPv4 subnets for a /24 prefix.
• Explain how to calculate IPv4 subnets for a /16 and /8 prefix.
• Given a set of requirements for subnetting, implement an IPv4 addressing scheme.
• Explain how to create a flexible addressing scheme using variable length subnet masking (VLSM).
 8.2 Addressing Schemes
• Given a set of requirements, implement a VLSM addressing scheme to provide
connectivity to end users in a small to medium-sized network.
• Implement a VLSM addressing scheme.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Chapter 8 - Sections & Objectives (Cont.)
 8.3 Address Schemes
• Explain design considerations for implementing IPv6 in a business network.
• Explain how to implement IPv6 address assignments in a business network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
8.1 Subnetting an IPv4
Network

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Network Segmentation
Broadcast Domains
 Devices use broadcasts in an Ethernet LAN to locate:
• Other devices - Address Resolution Protocol (ARP) which sends Layer 2 broadcasts to a known IPv4
address on the local network to discover the associated MAC address.
• Services – Dynamic Host Configuration Protocol (DHCP) which sends broadcasts on the local network
to locate a DHCP server.
 Switches propagate broadcasts out all interfaces except the interface on which it was received.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Network Segmentation
Problems with Large Broadcast Domains
 Hosts can generate excessive broadcasts and negatively affect the network.
• Slow network operations due to the significant amount of traffic it can cause.
• Slow device operations because a device must accept and process each broadcast packet.
 Solution: Reduce the size of the network to create smaller broadcast domains. These smaller
network spaces are called subnets.

One
Broadcast Broadcast in Broadcast in
Domain LAN 1 LAN 2
contained in contained in
1 subnet 1 subnet

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Segmentation
Reasons for Subnetting
 Reduces overall network traffic and improves network performance.

 Enables an administrator to implement security policies such as which subnets are allowed or not
allowed to communicate together. Communicating between
Networks

Subnetting by Location

Subnetting by Device Type

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Subnetting an IPv4 Network
Octet Boundaries

Networks
are most
easily
subnetted
at the
octet
boundary
of /8, /16,
and /24

 Prefix length and the subnet mask are different ways of identifying the network
portion of an address.
 Subnets are created by borrowing host bits for network bits.
 More host bits borrowed, the more subnets that can be defined.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Subnetting an IPv4 Network
Subnetting on the Octet Boundary

 Subnetting Network 10.x.0.0/16


 Define up to 256 subnets with each subnet capable of connecting 65,534 hosts.
 First two octets identify the network portion while the last two octets are for host IP addresses.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Subnetting an IPv4 Network
Subnetting on the Octet Boundary (Cont.)

 Subnetting Network 10.x.x.0/24


 Define 65,536 subnets each capable of connecting 254 hosts.
 /24 boundary is very popular in subnetting because of number of hosts.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Subnetting an IPv4 Network
Classless Subnetting
Subnetting a /24 Network

Subnets can borrow bits from any host bit position to create other masks.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Subnetting an IPv4 Network
Subnetting Formulas

Calculate Number of Subnetting a /24 Network


Subnets Formula

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Subnetting an IPv4 Network
Subnetting Formulas (Cont.)

Calculate Number of
Calculating the Number of Hosts
Hosts Formula

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Subnetting to Meet Requirements
Subnetting Based On Network Requirements

Host devices
used by
employees in
the Engineering
department in
one network
and
Management in
a separate
network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Subnetting to Meet Requirements
Network Requirement Example

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Subnetting to Meet Requirements
Network Requirement Example (Cont.)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Benefits of Variable Length Subnet Masking
Traditional Subnetting Wastes Addresses

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Benefits of Variable Length Subnet Masking
Variable Length Subnet Masks (VLSM)
Traditional Subnets of Varying Sizes

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Benefits of Variable Length Subnet Masking
Basic VLSM
Basic Subnetting

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Benefits of Variable Length Subnet Masking
VLSM in Practice

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Benefits of Variable Length Subnet Masking
VLSM Chart

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
8.2 Addressing Schemes

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Structured Design
Network Address Planning

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Structured Design
Planning to Address the Network
 Each host in an internetwork must have
a unique address.

 Need proper planning &


documentation.

 Must provide & control access to


servers from internal hosts and external
hosts.
 Layer 3 STATIC address assigned to a
server can be used to control access to
that server.

 Monitoring security and performance


of hosts means network traffic is
examined for source IP addresses that
are generating or receiving excessive
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

packets.
Structured Design
Assigning Addresses to Devices
 Devices that require addresses:

• End user clients


• Can be set for DHCP to save time and
manual errors.
• A change in the subnetting scheme requires
reconfiguration of DHCP server. IPv6 clients
use DHCPv6/SLAAC.
• Servers
• Configured with static addresses.
• Private addresses translated to public
addresses if accessible from the Internet.
• Intermediary devices
• Set with static addresses for remote
management.
• Gateway
• Router interface used to exit the network.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
8.3 Design Considerations for IPv6

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Subnetting an IPv6 Network
The IPv6 Global Unicast Address
 IPv6 subnetting is not concerned
with conserving address space. Structure
 IPv6 subnetting is about building an
addressing hierarchy based on the
number of subnetworks needed.

 IPv6 link-local address is never


subnetted.

 IPv6 global unicast address can be


subnetted.
 IPv6 global unicast address
normally consists of a /48 global
routing prefix, a 16 bit subnet ID,
and a 64 bit interface ID.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Subnetting an IPv6 Network
Subnetting Using the Subnet ID

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Subnetting an IPv6 Network
IPv6 Subnet Allocation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
8.4 Chapter Summary

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Conclusion
Chapter 8: Subnetting IP Networks
 Implement an IPv4 addressing scheme to enable end-to-end connectivity in a small to medium-
sized business network.
 Given a set of requirements, implement a VLSM addressing scheme to provide connectivity to end
users in a small to medium-sized network.

 Explain design considerations for implementing IPv6 in a business network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

You might also like